Bitlocker/Truecrypt Decryption Tool
Following on from my post www.mcafee.com/activate product key it recently came to my attention that Passware, Inc. A mcafee.com/activate product key feisty California company has released a version www.mcafee/activate of their forensic www.mcafee.com/activate download software which will decrypt Bitlocker www.mcafee.com/activate and TrueCrypt protected hard disks via the classic Firewire vulnerabilities.
A full write-up can be found on the www.mcafee/activate, but simply, given a machine that’s running, but has encrypted www.mcafee.com/activate product key drives (for example one using Bitlocker in TPM-only mode, or a machine which is suspended, not hibernated). As to how to do it, well they have www.mcafee.com/activate download implemented the exploit mcafee.com/activate product key in a very neat and usable way www.mcafee.com/activate:
Step 1 – capture a forensic memory image and disk images
1. Create the Firewire memory imager from www.mcafee/activate the Passware Kit on a USB Stick
2. Connect www.mcafee.com/activate the target www.mcafee.com/activate product key computer to the forensic computer using a Firewire cable
3. Boot the forensic computer mcafee.com/activate product key off the USB www.mcafee/activate stick from step 1 to capture www.mcafee.com/activate download the image
4. Create disk images using www.mcafee.com/activate tools such as Encase
Step 2 – Decrypt the disk images
1. Click “Recover Hard Disk Passwords” within the Passware Kit
2. Select Bitlocker or Truecrypt
3. Select the memory image file www.mcafee.com/activate product key, and the disk image file
4. Click Next – Passware will now decrypt the disk image.
This is, to my knowledge www.mcafee.com/activate, the first commercial www.mcafee/activate implementation (or should that be exploitation?) of the Firewire memory attack, and should be considered by anyone www.mcafee.com/activate download intending to use products such as Bitlocker or Truecrypt, without making sure they implement mcafee.com/activate product key them www.mcafee.com/activate product key in a way which www.mcafee.com/activate prevents this kind of exploitation. As always, encryption is no use without proper pre-boot authentication.
This obviously www.mcafee.com/activate product key unnerved a lot of people, especially www.mcafee/activate those hanging www.mcafee.com/activate download the safety of their secrets www.mcafee.com/activate on free solutions like Microsoft Bitlocker which use the TPM to provide convenience to their mcafee.com/activate product key users.The attack, invented about 60 years ago, but elegantly implemented by Christopher Tarnovsky of Flylogic involved attacking the hardware of the chip itself by uncasing it and probing its signal pathways.Christopher used a combination of off-the-shelf acids and rust-remover solutions to dissolve first the outer casing of the chip, then the wire grid tamper-proofing shields inside www.mcafee/activate. Once “undressed” he was able to probe and www.mcafee.com/activate download monitor what was going on inside anonymously.The Trusted www.mcafee.com/activate product key Computing Module, or TPM is used www.mcafee.com/activate in a variety of “secure” devices, such as Microsoft’s Xbox 360, smart phones, satellite TV receivers, and mcafee.com/activate product key of course most laptops and desktops.
Comments
Post a Comment